• 24 Posts
  • 661 Comments
Joined 9 months ago
cake
Cake day: January 8th, 2024

help-circle




  • What you are describing is the tor network.

    1. You connect to a guard node which knows who you are
    2. The Guard node connects to a middle relay node, and that middle relay only knows who the Guard is, but does not know who you are.
    3. If you are going to the standard internet, the relay node connects to an exit node, which knows who the relay operator is, but does not know who the guard node is and does not know who you are.
    4. The exit node connects to Facebook, Google, Amazon, etc. and only knows that the traffic goes back to the relay node when Amazon or whatever it responds. And then the entire thing goes in reverse back to you.

    Now, if you are going to a hidden service and not out to the standard internet, it does this process twice and so you get six hops in between yourself and the hidden service instead of the three to the standard internet.









  • On a privacy note in general, I got an email from Proton today saying that they were changing their terms of service and I actually care enough about the service that I went and read the new terms and privacy policies for the products that I use. I will admit to not understanding a lot of the legal ease, but the part I was most interested in was the data retention policies and data encryption. And that all seems to be pretty bulletproof from a tech angle.









  • We really don’t have to advocate or evangelize for it much considering the fact that it’s completely used on the dark net for drug purchases. Love them or hate them. Criminals are the first ones to adapt. New better technology. And then everybody else follows on after that. That video is a lot of guesswork and most of it is completely solvable either today or in the very near future. The idea that they can trace Monero depends on compromised nodes which is fixed by running your own node or using somebody you trust as a node provider trading with a centralized exchange which is easily solved by not trading with a centralized exchange, and ring signature weaknesses that are well-known and in the process of being fixed.